PT-2025-10816 · Microsoft · Windows File Explorer +1
Skorikari
+1
·
Published
2025-03-11
·
Updated
2025-12-07
·
CVE-2025-24071
CVSS v2.0
7.8
7.8
High
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
Microsoft Windows File Explorer (affected versions not specified)
Description
A security flaw in Windows File Explorer allows attackers to capture NTLM hashed credentials when a user opens a folder containing a specially crafted
.library-ms file embedded within a RAR or ZIP archive. The vulnerability is triggered automatically upon extraction of the archive; no user interaction beyond extraction is required. This allows attackers to perform network spoofing and potentially gain unauthorized access to systems. The vulnerability has been actively exploited in the wild, and a proof-of-concept (PoC) is publicly available. The issue stems from Windows Explorer automatically initiating an SMB authentication request when processing the .library-ms file, leading to the disclosure of NTLM hashes. Attackers have been observed using this vulnerability in phishing campaigns, and it has been reported that the vulnerability was offered for sale on underground forums. The vulnerability is related to the processing of UNC paths within the .library-ms file. Some reports indicate the vulnerability has been exploited through malicious documents containing links to SMB resources.Recommendations
Apply the latest security updates released by Microsoft for Windows File Explorer.
Exploit
Fix
LPE
Information Disclosure
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-02757
CVE-2025-24071
Affected Products
Windows
Windows File Explorer
References · 141
- 🔥 https://github.com/0x6rss/CVE-2025-24071_PoC?tab=readme-ov-file⭐ 86 🔗 11 · Exploit
- 🔥 https://github.com/0x6rss/CVE-2025-24071_PoC⭐ 22 🔗 4 · Exploit
- 🔥 https://github.com/Marcejr117/CVE-2025-24071_PoC 🔗 1 · Exploit
- 🔥 https://github.com/ThemeHackers/CVE-2025-24071⭐ 1 · Exploit
- 🔥 https://vicarius.io/vsociety/posts/cve-2025-24071-spoofing-vulnerability-in-microsoft-windows-file-explorer-detection-scrip · Exploit
- 🔥 https://github.com/shacojx/CVE-2025-24071-Exploit · Exploit
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24071 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-24071 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/718799 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-24071 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-02757 · Security Note
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24071 · Vendor Advisory
- https://twitter.com/transilienceai/status/1904679432331399664 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1nmo3h6/top_10_trending_cves_21092025 · Reddit Post
- https://twitter.com/cybercronai/status/1899992687077363941 · Twitter Post